diff --git a/docs/books/disa_stig/disa_stig_part2.md b/docs/books/disa_stig/disa_stig_part2.md index 6773270cdc..b512043062 100644 --- a/docs/books/disa_stig/disa_stig_part2.md +++ b/docs/books/disa_stig/disa_stig_part2.md @@ -36,7 +36,7 @@ If all goes well, you should receive a screen that looks something like this one DISA is just one of many Security Profiles supported by the Rocky Linux SCAP definitions. We also have profiles for: -* [ANSSI](https://www.ssi.gouv.fr/en/) +* [ANSSI](https://cyber.gouv.fr/en) * [CIS](https://cisecurity.org) * [Australian Cyber Security Center](https://cyber.gov.au) * [NIST-800-171](https://csrc.nist.gov/publications/detail/sp/800-171/rev-2/final) diff --git a/docs/guides/automation/cronie.md b/docs/guides/automation/cronie.md index 7450c90c6d..6ca54b77a3 100644 --- a/docs/guides/automation/cronie.md +++ b/docs/guides/automation/cronie.md @@ -114,7 +114,6 @@ The content discussed so far are simplistic options, but what about more complex Check the /var/log/cron* file, use `journalctl -u crond.service` to check the information about the daemon process, whether the script has x permission, etc., for troubleshooting. 3. In addition to cronie, what cron variants are there? [fcron](http://fcron.free.fr/), the latest version is 3.3.0 (dev, 2016-08-14). -[bcron](http://untroubled.org/bcron/), the latest version is 0.11 (2015-08-12). [cronsun](https://github.com/shunfei/cronsun), the latest version 0.3.5 (2018-11-20). ## Summary